Essays24.com - Term Papers and Free Essays
Search

Computer Virus

Essay by   •  June 18, 2011  •  2,200 Words (9 Pages)  •  2,038 Views

Essay Preview: Computer Virus

Report this essay
Page 1 of 9

1. Definition:

A computer virus is a program that makes copies of itself and infects files. The technical definition of a computer virus is "a self-replicating piece of computer code that can partially or fully attach itself to files or applications, and can cause your computer to do something you don't want it to do".

Computer viruses can spread to other computers and files whenever infected files are exchanged and disrupt those computers' normal operations. Several thousand computer viruses are known, and on average three to five new strains are discovered every day.

Computer viruses got their name from biological viruses. Like a biological virus is small, cannot exist without a host, and can be passed from human to human, computer viruses are also small, cannot exist without a host, and can be passed from computer to computer or from program to program.

2. How viruses spread:

They certainly don't float around in the air like some human viruses. Instead, like any other computer program, a human must create them. Infections spread from machine to machine, and from organization to organization, in a number of ways.

In order to infect a computer, a virus has to have the chance to execute its code. Viruses usually ensure that this happens by behaving like a parasite, i.e. by modifying another item so that the virus code is executed when the legitimate item is run or opened.

As long as the virus is active on the computer, it can copy itself to other files or disks that are accessed.

Viruses can be transmitted by:

 Booting a PC from an infected medium.

 Executing an infected program.

 Opening an infected file.

Good vehicles for viruses include the parts of a disk which contain code executed whenever that disk is booted, and documents which contain macros executed whenever that document is opened with the relevant application.

The virus can't affect the computer's ROM (Read Only Memory), but it can affect RAM (Random Access Memory) and your computer disks. When your shut off your computer a virus that has been picked up will be lost, just like any other memory that is held in RAM. If the virus is on your disk or hard drive, it will return to the computer when you use the program again. If you switch from one program to another without shutting down the machine, the virus will attach itself to the new program. In this way, it can slowly infect all your programs before you know that it exists.

Common routes for virus infiltration include:

 Email attachments: Often infected files come as email attachments, even from people you know. The email senders have no idea that they are passing on a file with a virus in it. Today, most computer viruses are sent and received via email. Most require the user to open or run an attached document. However, some use system vulnerabilities to automatically run when downloaded. One of the most common places for a computer virus to appear is on a file found on the Internet or attached to an E-mail.

 Floppy disks or other media that users can exchange: Computer viruses are spread via floppy disks, networks, or on-line services.

 Pirated software: Most of the time, programs that arrive by modem or a trade are perfectly safe to use. However, you do stand a chance of getting a program that has been tampered with. Here a computer program virus is hiding inside the normal program. Many computer programs that are traded were copied illegally. When this program enters your computer through your input device, it hides in your computer's memory and starts to duplicate itself like a disease. When you save your data, you also save the virus. Slowly but surely, the virus crowds out your data and causes major system problems.

 Many people get contaminated computer programs by trading programs with other people.

 Others get contaminated computer programs through the use of modems, which allow computers to communicate over telephone lines (i.e. The Internet)

Today millions of dollars are being spent to rid and protect computer systems from these virus programs.

Commercial and shareware programs have been created with the sole purpose of detecting and fixing suspect programs that might be viruses infected. These detection programs should be ran when any disk is put into your disk drive or every time your computer is first started up each day to scan the computer's hard drive.

3. Virus side-effects:

It can range from not really doing anything, to slowing computer response, to emailing everyone you know, to sending your data files to people you know and do not know, to outright destroying of data. These effects can range from harmless messages to data corruption or destruction.

4. Purpose of a Computer Virus

Why do people create these destructive programs? The virus writers come from various sections of society and each has a different motivation factor:

Ð'* Financial gain(employed by spammers and organized crime)

Ð'* Impress peers (mostly teen hacker)

Ð'* Ideological factors as freedom of knowledge or information

Ð'* Technical challenge and scoring a point (I am better than the team that put your software together)

Ð'* Political reasons ( a means to prove a political ideology and get focus of media)

Ð'* Tools to do something ( schoolboy creator but this is very miniscule)

Ð'* Some motives may be plain and simple revenge, cyber espionage and commercial sabotage.

Ð'* Some people create them just as a challenge.

5. History:

The term "virus" was first used in 1984 by a college professor, and the name stuck. The history of virus formation is given as below.

1945: Rear Admiral Grace Murray Hopper discovers a moth trapped between relays in a Navy computer. She calls it

...

...

Download as:   txt (13.9 Kb)   pdf (154.3 Kb)   docx (15.1 Kb)  
Continue for 8 more pages »
Only available on Essays24.com